메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 115-133

Intrusion detection: Systems and models

Author keywords

Books; Collaborative software; Computer hacking; Computer security; Control systems; Data security; Intrusion detection; Military computing; Network servers; Time sharing computer systems

Indexed keywords

COMPUTER CONTROL SYSTEMS; COMPUTER CRIME; COMPUTER NETWORKS; CONTROL SYSTEMS; GROUPWARE; MERCURY (METAL); NETWORK SECURITY; PERSONAL COMPUTING; SECURITY OF DATA; SECURITY SYSTEMS; TIME SHARING SYSTEMS;

EID: 81855175691     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ENABL.2002.1029998     Document Type: Conference Paper
Times cited : (30)

References (208)
  • 4
    • 33745293149 scopus 로고    scopus 로고
    • The Use of Information Retrieval Techniques for Intrusion Detection
    • Louvain-la-Neuve, Belgium
    • Anderson, R. and A. Khattak, "The Use of Information Retrieval Techniques for Intrusion Detection", Proceedings of RAID, Louvain-la-Neuve, Belgium, 1998.
    • (1998) Proceedings of RAID
    • Anderson, R.1    Khattak, A.2
  • 8
    • 0003699055 scopus 로고
    • Technical Report, Department of Computer Sciences, Purdue University
    • Autonomous Agents. Technical Report CSD-TR-95-022, Department of Computer Sciences, Purdue University, 1995.
    • (1995) Autonomous Agents
  • 10
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Tech. Pub. Indianapolis, IN
    • Bace, Rebecca, "Intrusion Detection." Macmillan Tech. Pub. Indianapolis, IN, 2000.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 23
    • 0013294745 scopus 로고    scopus 로고
    • Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection
    • Cumbria, U.K.
    • Cheung, S. and K. N. Levitt. "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection." Proceedings New Security Paradigms Workshop, Cumbria, U.K., 1997.
    • (1997) Proceedings New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.N.2
  • 34
    • 3943110072 scopus 로고
    • Modeling Attacks on Computer Systems: Evaluating Vulnerabilities and Forming a Basis for Attack Detection
    • Menlo Park, CA
    • Dias, G., K.N. Levitt, and B. Mukherjee. "Modeling Attacks on Computer Systems: Evaluating Vulnerabilities and Forming a Basis for Attack Detection." SRI Intrusion Detection Workshop, Menlo Park, CA, 1990.
    • (1990) SRI Intrusion Detection Workshop
    • Dias, G.1    Levitt, K.N.2    Mukherjee, B.3
  • 41
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • Menlo Park, CA
    • Eskin, E. "Anomaly detection over noisy data using learned probability distributions." In Proceedings of ICML 2000, Menlo Park, CA, 2000.
    • (2000) Proceedings of ICML 2000
    • Eskin, E.1
  • 48
    • 3943053209 scopus 로고    scopus 로고
    • Intrusion Detection Systems
    • Forte, D. "Intrusion Detection Systems" login: 24, 1, 1999.
    • (1999) Login , vol.24 , Issue.1
    • Forte, D.1
  • 53
    • 0344871638 scopus 로고    scopus 로고
    • FAQ: Network Intrusion Detection Systems
    • Robert Graham
    • Graham, R., "FAQ: Network Intrusion Detection Systems," InfoWorld, Robert Graham. 1998-2000.
    • (1998) InfoWorld
    • Graham, R.1
  • 54
    • 0345302827 scopus 로고    scopus 로고
    • Ph.D. thesis, University of California, San Diego, Department of Computer Sciences, San Diego, CA
    • Gross, A., "Analyzing Computer Intrusions." Ph.D. thesis, University of California, San Diego, Department of Computer Sciences, San Diego, CA, 1997.
    • (1997) Analyzing Computer Intrusions
    • Gross, A.1
  • 68
    • 84948704634 scopus 로고    scopus 로고
    • What is behavior-based intrusion detection?
    • IBM Zurich Research Laboratory. SANS Institute Resources
    • Herve, D. "What is behavior-based intrusion detection?" IBM Zurich Research Laboratory. SANS Institute Resources, Intrusion Detection FAQ, 2000.
    • (2000) Intrusion Detection FAQ
    • Herve, D.1
  • 73
  • 76
    • 0344871633 scopus 로고    scopus 로고
    • Published by Distributed Knowledge Systems Team; Computer Research and Applications Group; Computing, Information and Communications Division; Los Alamos National Laboratory, Los Alamos, New Mexico
    • Jackson, K. A., "Intrusion Detection System (IDS) Product Survey". Published by Distributed Knowledge Systems Team; Computer Research and Applications Group; Computing, Information and Communications Division; Los Alamos National Laboratory, Los Alamos, New Mexico, 1999.
    • (1999) Intrusion Detection System (IDS) Product Survey
    • Jackson, K.A.1
  • 81
    • 84893511281 scopus 로고    scopus 로고
    • Tripwire: A Case Study in Integrity Monitoring
    • edited by Dorothy and Peter Denning, Addison-Wesley
    • Kim, G. and E. H. Spafford. "Tripwire: A Case Study in Integrity Monitoring." Internet Besieged: Countering Cyberspace Scofflaws, edited by Dorothy and Peter Denning, Addison-Wesley, 1997.
    • (1997) Internet Besieged: Countering Cyberspace Scofflaws
    • Kim, G.1    Spafford, E.H.2
  • 83
    • 0343472276 scopus 로고    scopus 로고
    • (CMU/SEI-SIM- 006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
    • Kossakowski, P., "Responding to Intrusions." (CMU/SEI-SIM- 006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999.
    • (1999) Responding to Intrusions
    • Kossakowski, P.1
  • 104
    • 0000524153 scopus 로고
    • Intrusion Detection: Its Role and Validation
    • Oxford, UK: Elsevier Science Publishers, Ltd.
    • Liepins, G. and H.S. Vaccaro. "Intrusion Detection: Its Role and Validation." Computers and Security, 11, Oxford, UK: Elsevier Science Publishers, Ltd., 347-355, 1992.
    • (1992) Computers and Security , vol.11 , pp. 347-355
    • Liepins, G.1    Vaccaro, H.S.2
  • 111
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt, T. "A survey of intrusion detection techniques." Computers and Security, 12, 405-418, 1993.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.1
  • 114
  • 124
    • 3943053207 scopus 로고    scopus 로고
    • Intrusion Detection
    • Software Engineering Institute. Carnegie Mellon University
    • Mark, G. "Intrusion Detection," Software Technology Review, Software Engineering Institute. Carnegie Mellon University, 2000.
    • (2000) Software Technology Review
    • Mark, G.1
  • 127
    • 27244453070 scopus 로고    scopus 로고
    • GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis
    • Louvain-la-Neuve, Belgium
    • Me' L. "GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis." First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, 1998.
    • (1998) First International Workshop on the Recent Advances in Intrusion Detection
    • Me, L.1
  • 137
    • 3943112127 scopus 로고    scopus 로고
    • What is Network Based Intrusion Detection?
    • SANS Institute. SANS Institute Resources, Hyperlink: ID FAQ
    • Northcutt, S., "What is Network Based Intrusion Detection?" SANS Institute. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 2000.
    • (2000) Intrusion Detection FAQ
    • Northcutt, S.1
  • 139
    • 0344871636 scopus 로고    scopus 로고
    • What the Hackers Know about You
    • SANS Institute. SANS Institute Resources, Hyperlink: ID FAQ
    • Northcutt, S. "What the Hackers Know about You." SANS Institute. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 1999.
    • (1999) Intrusion Detection FAQ
    • Northcutt, S.1
  • 141
    • 3943098506 scopus 로고    scopus 로고
    • Intrusion Detection Systems
    • May
    • Panagiotis, A. "Intrusion Detection Systems". Daemon News. May 1999.
    • (1999) Daemon News
    • Panagiotis, A.1
  • 145
    • 3943072915 scopus 로고
    • CIAC-2305 R.1) Lawrence Livermore National Laboratory, Department of Energy Computer Incident Advisory Capability
    • Pichnarczyk, K.; Weeber, S.; and Feingold, R. "Unix Incident Guide: How to Detect an Intrusion." (CIAC-2305 R.1) Lawrence Livermore National Laboratory, Department of Energy Computer Incident Advisory Capability, 1994.
    • (1994) Unix Incident Guide: How to Detect An Intrusion
    • Pichnarczyk, K.1    Weeber, S.2    Feingold, R.3
  • 147
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD
    • Porras, P. and P.G. Neumann. "Emerald: Event monitoring enabling responses to anomalous live disturbances." National Information Systems Security Conference, Baltimore, MD, 1997.
    • (1997) National Information Systems Security Conference
    • Porras, P.1    Neumann, P.G.2
  • 153
    • 3643079262 scopus 로고    scopus 로고
    • A Software Platform for Testing Intrusion Detection Systems
    • Puketza, N., M. Chung, R.A. Olsson, and B. Mukherjee. "A Software Platform for Testing Intrusion Detection Systems" IEEE Software 14, no. 5, 43-51, 1997.
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.A.3    Mukherjee, B.4
  • 154
    • 3943113448 scopus 로고    scopus 로고
    • Do you have an intrusion detection response plan?
    • September 13
    • Reavis, J., "Do you have an intrusion detection response plan?" Network World Fusion, September 13, 1999.
    • (1999) Network World Fusion
    • Reavis, J.1
  • 155
    • 0012977967 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Roesch, M. "Snort - lightweight intrusion detection for networks." Proceedings of Lisa '99, 1999.
    • (1999) Proceedings of Lisa '99
    • Roesch, M.1
  • 157
    • 84948701316 scopus 로고    scopus 로고
    • What is the role of a file integrity checker like Tripwire in intrusion detection?
    • SANS Institute Resources
    • SANS Institute Resources, "What is the role of a file integrity checker like Tripwire in intrusion detection?" SANS Institute Resources, Intrusion Detection FAQ, 2000.
    • (2000) Intrusion Detection FAQ
    • SANS Institute Resources1
  • 158
    • 3943075640 scopus 로고    scopus 로고
    • Network intrusion-detection solutions
    • May 4, 1998. InfoWorld Corporation
    • Scambray, J.; McClure, S. and J. Broderick, "Network intrusion-detection solutions", InfoWorld, May 4, 1998. InfoWorld Corporation. 1998.
    • (1998) InfoWorld
    • Scambray, J.1    McClure, S.2    Broderick, J.3
  • 169
    • 3943079819 scopus 로고    scopus 로고
    • Method and System for Detecting Intrusion into and Misuse of a Data Processing System
    • U.S. Patent Office, September 17
    • Smaha, S. and S. Snapp. "Method and System for Detecting Intrusion into and Misuse of a Data Processing System." US555742, U.S. Patent Office, September 17, 1996.
    • (1996)
    • Smaha, S.1    Snapp, S.2
  • 179
    • 0007473204 scopus 로고    scopus 로고
    • An Introduction to Intrusion Detection
    • Hyperlink: acm.org/Crossroads, 1996
    • Sundaram, A., "An Introduction to Intrusion Detection", Crossroads: The ACM Student Magazine,2,4,1996, Hyperlink: acm.org/Crossroads, 1996.
    • (1996) Crossroads: The ACM Student Magazine , vol.2 , Issue.4
    • Sundaram, A.1
  • 180
    • 3943066188 scopus 로고
    • AI and 4GL: Automated Detection and Investigation and Detection Tools
    • Sydney, Australia
    • Tener, W. "AI and 4GL: Automated Detection and Investigation and Detection Tools." Proceedings of the IFIP Security Conference, Sydney, Australia, 1988.
    • (1988) Proceedings of the IFIP Security Conference
    • Tener, W.1
  • 181
    • 3943078391 scopus 로고
    • Discovery: An Expert System in the Commercial Data Security Environment
    • Monte Carlo
    • Tener, W. "Discovery: An Expert System in the Commercial Data Security Environment." Proceedings of the IFIP Security Conference, Monte Carlo, 1986.
    • (1986) Proceedings of the IFIP Security Conference
    • Tener, W.1
  • 188
    • 84948709069 scopus 로고
    • reprinted in Computer Security Journal 6,1, 89-93, 1990.
    • (1990) Computer Security Journal , vol.6 , Issue.1 , pp. 89-93
  • 194
  • 196
    • 3943101208 scopus 로고
    • Master thesis, University of California, Davis, CA
    • Wetmore, B. "Audit Browsing." Master thesis, University of California, Davis, CA 1993.
    • (1993) Audit Browsing
    • Wetmore, B.1
  • 197
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating Security Managers: A Peer-Based Intrusion Detection System
    • White, G., E.A. Fisch, and U.W. Pooch. "Cooperating Security Managers: A Peer-Based Intrusion Detection System." IEEE Network 10,1, 20-23, 1996.
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.1    Fisch, E.A.2    Pooch, U.W.3
  • 208
    • 3943051893 scopus 로고    scopus 로고
    • What is host-based intrusion detection?
    • Virginia Tech CNS. Hyperlink: ID FAQ
    • Zirkle, L., "What is host-based intrusion detection?" Virginia Tech CNS. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 2000.
    • (2000) SANS Institute Resources, Intrusion Detection FAQ
    • Zirkle, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.